top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Engineering Secure Future Internet Services and Systems [[electronic resource] ] : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli
Engineering Secure Future Internet Services and Systems [[electronic resource] ] : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (VIII, 393 p. 131 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Management information systems
Computer science
Computer logic
Application software
Data encryption (Computer science)
Systems and Data Security
Software Engineering
Management of Computing and Information Systems
Logics and Meanings of Programs
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-07452-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Structured Comparison of Security Standards -- Empirical Assessment of Security Requirements and Architecture: Lessons Learned -- STS-Tool: Security Requirements Engineering for Socio-Technical Systems -- Model-Driven Development of a Secure eHealth Application -- Modeling Security Features of Web Applications -- On the Synthesis of Secure Services Composition -- Privacy and Access Control in Federated Social Networks -- Engineering Trust-Awareness and Self-adaptability in Services and Systems -- Validation of Access Control Systems -- Evaluation of Engineering Approaches in the Secure Software Development Life Cycle -- A Toolchain for Designing and Testing Access Control Policies -- Verification of Authorization Policies Modified by Delegation -- ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System -- Divide and Conquer – Towards a Notion of Risk Model Encapsulation -- Preserving Data Privacy in e-Health.
Record Nr. UNISA-996217780903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Formal Aspects in Security and Trust [[electronic resource] ] : 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers / / edited by Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli
Formal Aspects in Security and Trust [[electronic resource] ] : 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers / / edited by Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 331 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Management information systems
Computer science
Information storage and retrieval
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-642-01465-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Formal Certification of ElGamal Encryption -- Secure Information Flow as a Safety Property -- Who Can Declassify? -- Non-Interference for Deterministic Interactive Programs -- Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels -- Causality and Accountability -- Dynamics, Robustness and Fragility of Trust -- Trust within the Context of Organizations: A Formal Approach -- Know What You Trust -- Privacy-Friendly Electronic Traffic Pricing via Commits -- A Formal Privacy Management Framework -- Parameterised Anonymity -- Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder -- Petri Net Security Checker: Structural Non-interference at Work -- Verifying Multi-party Authentication Using Rank Functions and PVS -- The Append-Only Web Bulletin Board -- Secure Broadcast Ambients -- Extending Anticipation Games with Location, Penalty and Timeline -- Do You Really Mean What You Actually Enforced? -- Delegating Privileges over Finite Resources: A Quota Based Delegation Approach -- Access Control and Information Flow in Transactional Memory.
Record Nr. UNINA-9910483358103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Formal Aspects in Security and Trust [[electronic resource] ] : 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers / / edited by Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli
Formal Aspects in Security and Trust [[electronic resource] ] : 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers / / edited by Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 331 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Management information systems
Computer science
Information storage and retrieval
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-642-01465-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Formal Certification of ElGamal Encryption -- Secure Information Flow as a Safety Property -- Who Can Declassify? -- Non-Interference for Deterministic Interactive Programs -- Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels -- Causality and Accountability -- Dynamics, Robustness and Fragility of Trust -- Trust within the Context of Organizations: A Formal Approach -- Know What You Trust -- Privacy-Friendly Electronic Traffic Pricing via Commits -- A Formal Privacy Management Framework -- Parameterised Anonymity -- Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder -- Petri Net Security Checker: Structural Non-interference at Work -- Verifying Multi-party Authentication Using Rank Functions and PVS -- The Append-Only Web Bulletin Board -- Secure Broadcast Ambients -- Extending Anticipation Games with Location, Penalty and Timeline -- Do You Really Mean What You Actually Enforced? -- Delegating Privileges over Finite Resources: A Quota Based Delegation Approach -- Access Control and Information Flow in Transactional Memory.
Record Nr. UNISA-996466037203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (X, 259 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Information storage and retrieval
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-540-32629-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Voting Technologies and Trust -- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol -- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks -- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols -- Eliminating Implicit Information Leaks by Transformational Typing and Unification -- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised to Transition Systems -- Unifying Decidability Results on Protection Systems Using Simulations -- Proof Obligations Preserving Compilation -- A Logic for Analysing Subterfuge in Delegation Chains -- Probable Innocence Revisited -- Relative Trustworthiness -- Secure Untrusted Binaries — Provably! -- Normative Specification: A Tool for Trust and Security -- Type-Based Distributed Access Control vs. Untyped Attackers -- A Security Management Information Model Derivation Framework: From Goals to Configurations -- On Anonymity with Identity Escrow -- Towards Verification of Timed Non-repudiation Protocols.
Record Nr. UNISA-996466098103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (X, 259 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Information storage and retrieval
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-540-32629-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Voting Technologies and Trust -- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol -- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks -- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols -- Eliminating Implicit Information Leaks by Transformational Typing and Unification -- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised to Transition Systems -- Unifying Decidability Results on Protection Systems Using Simulations -- Proof Obligations Preserving Compilation -- A Logic for Analysing Subterfuge in Delegation Chains -- Probable Innocence Revisited -- Relative Trustworthiness -- Secure Untrusted Binaries — Provably! -- Normative Specification: A Tool for Trust and Security -- Type-Based Distributed Access Control vs. Untyped Attackers -- A Security Management Information Model Derivation Framework: From Goals to Configurations -- On Anonymity with Identity Escrow -- Towards Verification of Timed Non-repudiation Protocols.
Record Nr. UNINA-9910485047703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations of Security Analysis and Design III [[electronic resource] ] : FOSAD 2004/2005 Tutorial Lectures / / edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli
Foundations of Security Analysis and Design III [[electronic resource] ] : FOSAD 2004/2005 Tutorial Lectures / / edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (VIII, 276 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Management information systems
Computer science
Computer logic
Systems and Data Security
Cryptology
Operating Systems
Computer Communication Networks
Management of Computing and Information Systems
Logics and Meanings of Programs
ISBN 3-540-31936-0
3-540-28955-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion Detection and Security Information Management -- Security and Trust Requirements Engineering.
Record Nr. UNINA-9910484151203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations of Security Analysis and Design III [[electronic resource] ] : FOSAD 2004/2005 Tutorial Lectures / / edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli
Foundations of Security Analysis and Design III [[electronic resource] ] : FOSAD 2004/2005 Tutorial Lectures / / edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (VIII, 276 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Management information systems
Computer science
Computer logic
Systems and Data Security
Cryptology
Operating Systems
Computer Communication Networks
Management of Computing and Information Systems
Logics and Meanings of Programs
ISBN 3-540-31936-0
3-540-28955-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion Detection and Security Information Management -- Security and Trust Requirements Engineering.
Record Nr. UNISA-996465619803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations of Security Analysis and Design VII [[electronic resource] ] : FOSAD 2012 / 2013 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli
Foundations of Security Analysis and Design VII [[electronic resource] ] : FOSAD 2012 / 2013 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (VIII, 282 p. 98 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Computers
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Theory of Computation
ISBN 3-319-10082-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Model-Based Testing for Functional and Security Test Generation -- Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif.- Defensive JavaScript: Building and Verifying Secure Web Components.- Information Flow Control for Web Scripts -- EasyCrypt: A Tutorial.- Cryptographic Voting — A Gentle Introduction.- Encryption and Fragmentation for Data Confidentiality in the Cloud.- Location Privacy in WSNs: Solutions, Challenges, and Future Trends.
Record Nr. UNINA-9910483566503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations of Security Analysis and Design VII [[electronic resource] ] : FOSAD 2012 / 2013 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli
Foundations of Security Analysis and Design VII [[electronic resource] ] : FOSAD 2012 / 2013 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (VIII, 282 p. 98 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Computers
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Theory of Computation
ISBN 3-319-10082-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Model-Based Testing for Functional and Security Test Generation -- Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif.- Defensive JavaScript: Building and Verifying Secure Web Components.- Information Flow Control for Web Scripts -- EasyCrypt: A Tutorial.- Cryptographic Voting — A Gentle Introduction.- Encryption and Fragmentation for Data Confidentiality in the Cloud.- Location Privacy in WSNs: Solutions, Challenges, and Future Trends.
Record Nr. UNISA-996198264103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations of Security Analysis and Design VIII [[electronic resource] ] : FOSAD 2014/2015/2016 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli
Foundations of Security Analysis and Design VIII [[electronic resource] ] : FOSAD 2014/2015/2016 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (VII, 163 p. 36 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Application software
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 3-319-43005-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Efficient Zero-Knowledge Proof Systems -- JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript -- From Zoos to Safaris — From Closed-World Enforcement to Open-World Assessment of Privacy -- Distributed Authorization in Vanadium.
Record Nr. UNISA-996466034803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui